Summary
VICIDIAL is prone to a command-injection vulnerability because the application fails to properly sanitize user-supplied input.
Impact
An attacker may leverage this issue to execute arbitrary commands in the context of the affected application.
Solution
Ask the Vendor for an update.
Insight
In multiple locations, there are calls to passthru() that do not perform any filtering or sanitization on the input.
Affected
VICIDIAL 2.7RC1, 2.7 and 2.8-403a are vulnerable
other versions may also be affected.
Detection
Send a crafted HTTP GET request which tries to execute the 'id' command.
References
Severity
Classification
-
CVE CVE-2013-4467, CVE-2013-4468 -
CVSS Base Score: 6.5
AV:N/AC:L/Au:S/C:P/I:P/A:P
Related Vulnerabilities
- Apache Archiva Cross Site Request Forgery Vulnerability
- APC PowerChute Network Shutdown HTTP Response Splitting Vulnerability
- Apache Rave User Information Disclosure Vulnerability
- Aardvark Topsites PHP 'index.php' Multiple Cross Site Scripting Vulnerabilities
- Apache Web Server ETag Header Information Disclosure Weakness